Signature verification revisited:

Size: px
Start display at page:

Download "Signature verification revisited:"

Transcription

1 Signature verification revisited: promoting practical exploitation of biometric technology by MI C. Fairhurst Despite research over a long period, biometric approaches to authenticating personal identity have not met with the degree of success in practical applications originally predicted. This paper discusses approaches to biometric testing, focusing particularly on automatic signature verification, and addresses some of the important issues which might help to promote the introduction of practical systems in the future. Examples associated with the adoption of an explicitly flexible approach to signature verification are used to illustrate the discussion, and it is argued that there is still considerable potential for practical exploitation of this type of technology. 1 Background In an increasingly complex and sophisticated society, more and more demands are being placed on individuals to be able, when challenged, to produce proof of identity. In fact, so widespread, pervasive and ingrained is this concept that in all but the most extreme or unusual circumstances most people do not even recognise a situation as a challenge, and would certainly not consider the procedure at all out of the ordinary. Hence we find it perfectly acceptable to tap in a digit-based PIN (personal identification number) identifier to obtain money from a bank cash dispenser, to sign a sales voucher for scrutiny by a shop assistant, or to have our passport photograph checked at an airport. The purpose of such procedures is to provide corroborating evidence to authenticate our claimed identity - to confirm we are who we say we are - and it is clear, even from these examples, that the evidence we can supply can take several different forms. The most common authenticating strategy is to identify a physical entity which itself is of known provenance (e.g. the possession of an approved swipecard for access control), or to check guaranteed information known on a restricted basis (PIN number, password, etc.). A third common option is to validate identity by means of a specific individual activity pattern - the basis of the legal handwritten signature or of voiceprints - and, finally, it is possible to look for recognisable and unique physical features possessed by an individual (fingerprints are the most familiar, but iris scanning or hand geometry are other po~sibilities) -~. Each possible approach has its own positive and negative characteristics which are suited to a greater or lesser extent to different applications and situations, and each offers reliability of a greater or lesser degree. All rely on increasingly sophisticated technology for their introduction and regular use. Most of the techniques falling into the first two categories of the four noted above are already in widespread use but are also unfortunately susceptible to compromise on a large scale (e.g. PIN numbers are very frequently passed on or written down for ease of recall, entry cards and other documents are easily copied, stolen or lost). For this reason there has been a long-standing interest in developing methods of personal identity authentication based on strategies falling into the third and fourth categories. These techniques all rely on biometric measurements, defined by the Association for Biometrics as : the automated measuring of one or more specific attributes or features of a person, with the aim of being able to distinguish that person from all others. It is clear that we can subdivide the biometric options further, broadly based on the two categories noted above, into physiological biometrics (iris characteristics, fingerprints, etc.) and behavioural biometrics (signature checking, keystroke dynamics, etc.). Although many early devices purporting accurately to measure biometric characteristics often did not live up to expectations, more recent developments have made viable, in principle, the introduction of technology which, under appropriate circumstances, can lead to commercial exploitation of biometric testing. The two principal issues relating to the introduction of a specific biometric authentication procedure concern the reliability and robustness of the procedure (essentially a technological issue) and the extent to which the intended user community finds the technique and its implications acceptable (largely a social issue). Both issues can generate heated debate but, whereas the first is very much open to discussion, in the second area there would be a general consensus that, although ELECTRONICS & COMMUNICATION ENGINEERING JOURNAL DECEMBER

2 alternatives can of course be considered, the use of the personal handwritten signature has the significant advantages that: (a) the signature is the most natural and generally established of all the ways in which we seek to confirm our identity. This is confirmed in a number of studies, including one carried out by the author7. (b) the use of signature verification will minimise the disruption to accepted practices with respect to transactions where personal identity has to be authenticated (c) measurement of signature characteristics is noninvasive (compare this with other potential techniques such as iris scanning) and has no negative or undesirable health connotations (as might be the case with, say, fingerprint checking, which is often considered to raise civil liberties issues and which, in use, involves direct physical contact with a possibly contaminated surface). This is potentially a most important practical issue, the significance of which should not be underestimated. This paper will examine some of the important issues underlying the exploitation of technological approaches to the processing of handwritten signatures as a means of verlfying personal identity. Although reviewing some of the underlying technologies which may be used to address the problems of signature verification, the paper will particularly seek to show how the way in which a system is configured and matched to a specific set of task requirements is equally influential in developing a viable and successful system. Taken together, these aspects of the design and implementation of a signature verification processor will point the way to providing the major components and processing environment which will best promote the use of automatic signature verification in practice, and it is this which is the principal focus of this paper. 2 Approaches to automatic signature verification Approaches to the signature verification problem can be broadly categorised into static verification methods, dynamic Verification methods (where both rely on underlying statistical or structural processing methodologies), or neural network techniques. The static approach, based as it is on the limited information available from the shape and structure of the signature image alone, represents a very difficult problem. Techniques can be found which are based on the extraction of shape descriptors or on stroke models based on psychophysical observations of signature execution8. Recent work has adopted a technique based on relational similarity measures between reference profiles and pairs of text primitivesg. Many dynamic approaches are based on dynamic programming techniques, and appropriate signals for measurements are well known''. Again, a variety of subsidiary paradigms have been invoked. Some are based directly on models of the handwriting generation process", or on signature analysis using perceptually important points", while others seek a multilevel approach to focus particularly on the elimination of forgeries13. Recent worki4 has used spectral stroke analysis in conjunction with a structured knowledge base. Some systems, such as the KAPPA approach developed by the authori5, are able to integrate efficiently dynamic and static information. Recently, neural network approaches have been generating significant interest, and have been used in segmentation and in tackling static and dynamic Despite the many advantages of this paradigm, a significant disadvantage is generally the requirement for large training sets of samples, which precludes application in most practical problems. Although it is therefore possible to address the problem of automatic signature verification in a variety of ways, such as by treating the signature as a time-varying signal which can be matched to a reference template, it is more common and generally more effective to approach the problem by extracting specific features from the signature image and/or execution pattern and to use these as the basis for comparison against a stored model which can reflect the statistical variations in individual signature specimens. Since automatic signature verification has a long history it is not surprising that a wide range of features have been proposed by means of which to characterise an individual signature. For illustrative purposes, some typical examples might include measurements based on the following: Static features: Number of component strokes Ratio of long to short strokes Curvature measurements Segment lengths etc. Dynamic features: Timing measurements Stroke order Pen velocity profiles Pen acceleration profiles Pen up/pen down patterns etc. Likewise, signature sample acquisition is possible using a variety of different physical devices. For off-line capture any standard commercial device (e.g. document scanner, camera) may be used, since in these conditions the signature sample is represented solely as a twodimensional image. For on-line capture, it is customary to use a digitising tablet with associated pen. Such a device allows not only the reconstruction of the signature (through the capture of the co-ordinate stream traced out by the pen) as avisual image, but also allows the extraction of the dynamic features of signature execution. Again, there are many commercial devices available. Some require the use of a wired pen (which may sometimes 274 ELECTRONICS & COMMUNICATION ENGINEEQNG JOURNAL DECEMBER 1997

3 constrain the signing process in an undesirable way); others utilise a free pen which creates a much more familiar signing environment for the user and causes little interference in the signing process. All such devices inherently provide information about the pen trajectory across the available writing surface, and some additionally detect pen pressure and hence offer a potential source of further dynamic information. An example of a typical device is shown in Fig. 1. In general, automatic signature verification requires two distinct processing stages. Initially, a potential user enrols on to the system by providing signature samples on the basis of which a class model can be constructed which Fig. 1 A digitising tablet and pen - a typical input device for signature capture verification system, which adopts the principle of seeking a universally applicable set of features on which to base a judgement about the acceptability of individual samples, has provided a wide variety of possible solutions to the problems inherent in the processing of the highly variable data associated with verification based on behavioural biometrics and the requirements of robustness and security (see, for example, References 19 and 20). However, it is increasingly being recognised that this principle of universality may be a limiting factor in reliable system design and that a greater degree of success might be achievable if the specific requirements of a given task domain and the precise way in which the system is to be used can be taken into account. This suggests an approach (statistically) encapsulates the characteristics of an individual signer. Subsequently, a verification processing to the design of signature verification systems in which procedure is invoked to judge the likely authenticity of a considerably greater flexibility is incorporated. There are a presented sample with respect to its alleged class model. variety of operational parameters which may be important The process is summarised in Fig. 2. in characterising and evaluating a system, including Verification errors occurring in a signature verification performance indicators such as the error rate achieved system may be categorised as one of two types. On the one (more precisely, the balance between Type I and Type I1 hand, a genuine signer may be rejected by the system as a errors), processing speed attainable, number of training potential forger (as could happen, for example, because of samples required to construct a signature model, the the execution of an atypical or particularly careless sample degree of security afforded to the signature data, cost of from a genuine signer), resulting in what is denoted a implementation, robustness in operation, and so on. In Type I error. On the other hand, a skillful forger might be many cases, performance indicators can be traded one able to generate a sample which would be accepted as against another, and an optimal configuration is taskgenuine, resulting in a Type I1 error. It is seen that the dependent. Hence it appears potentially productive to adopt verification process may be characterised as the evaluation an approach to system design based on the development of of a discriminant function for a toolkit of processing a given test sample which can modules which, through be compared against a selection and configuration in threshold value. Whether or an appropriate way, can not the sample is considered satisfy a wide range of to be acceptable or not is then practical requirements. determined by whether the For the purposes of discriminant value generated illustration, it is helpful to by that sample is greater than consider a practical system. or less than the threshold An example of a system which chosen. The threshold is specified using exactly this setting is clearly instru- type of flexible implemenmental in determining the Fig. 2 Processing stages for automatic signature tational framework is the limits of acceptability within verification KAPPA signature verification which the signature will be systemi5. This is a system considered to be genuine, and it is this which will define which can operate in either on-line or off-line mode, can exactly the nature of the trade-off which can be achieved make independent checks of static and dynamic features of between maintaining a resistance of the system to the the signature, and can draw on a variety (unlimited in possibility of compromise through forgery and the very principle) of feature types to drive the verification real practical problem of ensuring that the number of false algorithms. The system is structured in a very flexible and rejections generated is as small as possible. adaptable way, and hence can be used in a variety of The approach commonly taken in designing a application areas with differing practical requirements. ELECTRONICS & COMMUNICATION ENGINEERING JOURNAL DECEMBER

4 a variety of task domains. An overview of the broad structure of the system, emphasising its modularity, is shown in Fig. 3, and Fig. 4 shows a typical PCbased implementation. This type of system is very useful in illustrating some fundamental principles for maximising the effectiveness with which automatic signature verification can be made to work in practice. In particular, it is interesting to consider how the tools provided can be used to optimise system performance in appropriate circumstances. Some of the important issues to be considered in this context will be examined in the following Sections from a practical point of view. 3 Feature selection for system optimisation Fig. 3 Structure of the KAPPA signature verification system KAPPA embodies a number of characteristics of practical significance. The system has a highly modular structure configured as a design toolkit, it can achieve online and off-line processing, it can utilise multisource feature extraction (depending on the data capture facilities adopted), it has the capacity for feature selection, offers many optimisation features such as enrolment model validation, and can provide robust and efficient operation in Fig. 4 A PC-based implementation of the KAPPA system As noted above, conventional approaches to the problem of automatic signature verification generally adopt a procedure for constructing a universal or classindependent feature vector which then forms the basis of averification decision using an appropriate decision function. However, the highly individual nature of the handwritten signature suggests that an approach which adopts a personalised optimisation of the features used for verification, i.e. where the verification process is based on the extraction of an individually selected set of descriptive features to characterise the signature of each enrolled user of the system, might be productive. A principal difficulty with attempting meaningful feature selection for the specific problem of automatic signature verification is the generally encountered lack of adequate statistical information to describe authentic patterns. In order to select an optimum set of features requires a mechanism for generating combinations of possible features and a metric by means of which to assess the relative merits of the features to identify the optimum set, and in this application these requirements point to the need for some form of heuristic, rather than more formal analytical, evaluation of an appropriate criterion function for use in determining a useful feature set. An approach embodying this principle has been developed based on the progressive generation of an optimised active feature set for each individual signer determined by invoking a novel criterion function which is locally computed from an analysis of the relation between Type I and Type I1 errors as a function of the applied discrimination threshold. Here, error performance for a given individual signer is evaluated on the basis of a reference population of possible signers. Fig. 5 shows the principle behind the measurement of the criterion 276 ELECTRONICS & COMMUNICATION ENGINEERING JOURNAL DECEMBER 1997

5 function, where individualised feature selection begins from a pool of possible features from which an algorithmic selection procedure evolves an active subset of features for an individual signer until optimality is attained. Here, the criterion function is chosen as the separation between the respective Type I/Type I1 zero point crossings on the verification threshold axis (denoted the 0% region ), and it is this separation distance which is to be maximised. An iterative search method can be adopted, whereby features are selectively added to and deleted from a subset of active features, depending on their relative merits with respect to the previously selected features. Specifically, a simple technique has been implemented based on the evolution of the initial empty active feature vector through a process of iteratively adding n features and subsequently deleting m features (n > nz) until the criterion function has satisfied a termination criterion. Fig. 6 shows the typical profile of the development of the active feature vector. If too few features are available there is an under-characterising of information available to the verification processor. Also a point is reached where redundancy can again diminish the power of the active feature set in discriminating between genuine and false signature samples. The pool of features from which the active feature vector is constructed will generally be expected to be large (typically of the order of perhaps 100 or more features), and this leads to a situation where the generation of the individually optimised feature vector incurs very large computational overheads. Although a direct serial implementation of this type of approach is consequently precluded in almost all practical cases, it has been found that a very efficient mapping to a parallel hardware implementation is possible. In terms of achievable performance, this type of optimisation approach can be very effective in appropriate circumstances. For example, in a small-scale trial with a group of 22 signers each donating 40 sample signatures, it was found that an error rate of 182% when operating with a universal feature vector of 40 elements was reduced to 0% with implementation of the individual feature optimisation procedure. An additional advantage is the significant potential reduction in the number of features which must be derived from each sample during the operational phase and which must be stored at some point in the enrolment/verification processing chain. Fig. 5 The principle behind measurement of the criterion function made purely at the operational level, but one which, where appropriately introduced, can significantly reduce the problem of a higher-than-acceptable false rejection rate without necessarily compromising the security of the system to attempted forgery in a significant way. More generally, one of the modular components of the KAPPA system is an enrolment validation module, the purpose of which is to ensure that false rejections do not occur simply as a result of using a signature model which is inadequate or unrepresentative of the range of signature specimens which are validly generated by a particular signer. This is an important issue, mainly because the inherent nature of a practical signature verification system is that operational conditions generally preclude the availability of a large set of samples from which to construct the signature model, leading to a significant risk that the model does not adequately represent the signing profile of any given individual. By invoking an enrolment validation module it is possible to construct an initial signature model on the basis of a (fixed) small number of donated samples, but to seek additional samples with which to refine the 4 System optimisation at the operational level A further advantage of the modular approach may be illustrated conveniently by considering a situation where operational constraints within a specific task domain can be controlled. In the simplest case, it can be seen that there are various situations in which it is possible to disregard a single shot false rejection of a valid signature by introducing the possibility of a retry facility, often employed in other similar situations (for example, in PIN-based ATM access), where the signer is allowed, say, three attempts to generate an acceptable signature sample before overall rejection occurs. This is clearly a decision which can be Fig. 6 Typical profile of the development of the active feature vector ELECTRONICS & COMMUNICATION ENGINEERING JOURNAL DECEMBER

6 Fig. 7 Effect of number of training samples on enrolment validation in an on-line verification process model if its initial representation is shown to be unsatisfactory. This allows a greater degree of control over the characteristics of the model ultimately adopted when the system is routinely used for verification of unknown samples. This idea is illustrated in Fig. 7, which shows the effect of enrolment validation in an on-line verification process when up to ten donated samples are allowed for construction of an individual signature model. It is apparent that an enrolment set size based on an initial small number of donated samples (five in this case) frequently leads to an unsatisfactory model, thereby potentially seriously compromising the subsequent performance and reliability of the system as a whole. In fact, as can be seen, using this fixed and limited set of samples for enrolment leads to a situation where around 30% of enrolees would have subsequent signatures processed with an unsatisfactory reference model, thereby significantly increasing the risk of compromising the reliability of system performance. If, however, further samples (up to a maximum of ten in the case shown here) are allowed, only around 6% of enrolees would then fail to enrol satisfactorily. More generally, the overall system error was measured using a large database (comprising more than 8000 signature samples) generated during public trials with the system. The results of this testing bear out the importance of reference model validation, for it was found that using a fixed enrolment sequence of 5 samples per enrolee resulted in a false rejection rate as high as around 20%, whereas allowing up to 10 samples per enrolee reduced this to around 6.9%. Furthermore, if individuals who failed to provide a satisfactory enrolment were then excluded from the system, the error rate fell further to around 1.8%. Finally, allowing a retry on rejection facility (up to 3 attempts) allowed the system to operate at a false rejection rate of significantly less than 1%. It is clear, therefore, that options such as this, which can be conveniently and naturally introduced within a modular framework, can be extremely valuable in realising levels of performance which are likely to encourage the introduction of this type of technology into practical situations. 5 Static enrolment validation A prototype implementation of the KAPPA system in use in trials conducted at Hedge End Post Office, near Southampton. These trials allowed the collection of more than 8000 signature samples from more than 300 signers. The trials took place in a typical retailing environment, involved a true cross-section of the general public, and allowed signatures to be collected over an extended period of several weeks. The database of signature samples collected in this way is especially valuable, since it reflects the characteristics of a population which can be considered highly representative of a typical operational environment in which a practical verification system might have to work. The photograph shows a volunteer donating samples during the trial. The previous Section described how the utilisation of an enrolment validation facility can be optimised through the introduction of simple operational procedures which can be controlled within a known operating environment. This focused specifically on a situation where on-line processing enabled dynamic information about signature execution to be considered. There are many practical situations, however, in which only static information extraction (i.e. off-line processing) is possible, and it is clear that the incorporation of a similar validation procedure could potentially be very effective in such situations. In these circumstances there are two fundamental difficulties to be addressed. The first is the obvious fact that static features, by their very nature, are likely to provide a much less rich source of verifying data on which the processing module can operate. The second is that in most situations where static processing is necessary, the number of enrolment samples which can be utilised is 278 ELECTRONICS & COMMUNICATION ENGINEERING JOURNAL DECEMBER 1997

7 generally strictly limited by the nature of the specific task. However, it is possible to show that the principle of enrolment validation is still applicable even in these situations. For example, experiments have been carried out to develop an algorithm which can evaluate a set of signature samples, rejecting samples which degrade the current reference model. Reference models were constructed from a pool of 15 candidate samples per signer for a group of approximately 250 signers on the basis of selecting the best n out of m samples. In order to illustrate the global effect of this procedure, performance was measured on the basis of the so-c alled equal error rate, found by plotting the respective changes in Type I and Type I1 individual error rates as a function of acceptance threshold, and recording the point at which the two error curves intersect (i.e. the point at which thetjpe I andtype I1 error rates are equal). Some test results are illustrated in Figs. 8 and 9, which compare the performances attainable with and without this type of enrolment validation. A number of interesting points become apparent from these results. It is immediately clear, for example, that the verification performance achievable is limited when only static features can be extracted from the signature samples, but that the introduction of an enrolment validation procedure is effective in considerably improving the error rates generated. Thus, in static processing, the introduction of such a mechanism may often be particularly important. Figs. 8 and 9 also illustrate clearly the difficulty of operating with a small number of enrolment samples, and it is seen that typically at least 8-10 valid samples per enrolee are required in order to achieve performance stability. This type of analysis clearly emphasises the desirability of adopting some form of enrolment validation, particularly in situations where only static feature extraction is possible, or in situations where small numbers of signature samples are available from which to construct a reference model. 6 Conclusions and a look to the future achievable performance, of other alternative forms of biometric measurement. Starting from the widely-held viewpoint that the handwritten signature is the most traditionally recognised, natural and acceptable form of biometric, this paper has sought to address a number of key issues which might be particularly influential in promoting the exploitation of signature verification technology in a practical domain. It has been shown, for example, that a universal solution to the signature verification problem may be to all intents and purposes impractical, while better matching to specific task domains might be more productive. To this end a system architecture has been developed which offers a toolkit for a system designer to facilitate this type of taskoriented optimisation. Likewise, it is clear that - apart from focusing on the inherent merits of individual signature processing algorithms themselves - an examination of other significant operational factors can lead to approaches for improving attainable levels of performance in practice, and that a clear understanding of the limitations and constraints of a given operational environment can be instrumental in maximising the benefits afforded by technological solutions. It is apparent, however, that for many applications, particularly those which seek large- Fig. 8 Equal error rate for non-validating reference model Although research in automatic signature verification has a long history, attempts to design a system sufficiently robust to allow the widespread introduction of such technology in practice have not generally met with the degree of success originally anticipated. It has been claimed by potential users that the performance levels achieved to date have been the principal reason for this, yet the nature of the data generated in this type of application introduces a limiting factor which considerably reduces the scope of what can be done to achieve the levels of performance often quoted as being required. The same has been true, though sometimes for reasons of public acceptability rather than Fig. 9 Equal error rate for validating reference model ELECTRONICS & COMMUNICATION ENGINEERING JOURNAL DECEMBER

8 Professor Michael Fairhurst has been on the academic staff of the Electronic Engineenng Laboratory at the University of Kent since 1972 He has been actively involved in various aspects of research in image analysis and computer wsion, with a particular interest in computational architectures for image analysis and the implementation of high-performance classification algonthms. App lication areas of principal concern include handwritten text reading and document processing, security and biometrics, and medical image analysis. Professor Fairhurst is a current member and past Chairman of the IEE Professional Group E4 on Image Processing andvision, and has in the past been a member of the Professional Group Committee for Biomedical Engineering. He has been Chairman of several of the IEE series of international conferences on Image Processing and Applications. Address: Electronic Engineering Laboratory, University of Kent at Canterbury, Canterbury, Kent 02 7NT, UK. M.C.Fairhurst@ukc.ac.uk scale introduction of a new technology, automatic signature verification solutions may be resisted and it is unlikely that signature verification, in common with most other currently available biometrics, will be able to offer the absolute levels of attainable performance which have been specified to date. It is possible, however, that these stringent requirements will be reviewed, but in the meantime there are still positive messages for those who believe that practical biometric testing still has much to offer even in the short term. The first is that the sort of modular design approach advocated here should allow the introduction of more reliable products than might otherwise be possible. The second is that there are an increasing number of smaller-scale, localised application areas where existing technology can find an effective role to play. The final point, and perhaps that which is ultimately most likely to be of real benefit, is that great potential exists for the introduction of systems which integrate multiple biometrics or which use biometric testing as a secondary or confirmatory check in a broader-based protocol for establishing or validating individual identity. Far from biometrics being the stuff of science fiction (or even the research laboratory), existing technology may yet offer opportunities for practical success here and now. References 1 NAKAMURA, O., ILZATHUR, S., and MILHAMI, T.: Identification of human faces based on isodensity maps, Pattern Recognit., 1991,24, pp HRECHAK, A. K., and McHUGH, J. A.: Automated fingerprint recognition using structural matching, Pattern Recognit., 1990,23, pp DAUGW, J.: High confidence recognition of persons by rapid video analysis of iris texture. Proc. ECOS95 (European Convention on Security and Detection), IEE Coni Publ. No. 408,1995, pp ASHBOURNE, J.: Practical implementation of biometrics based on hand geometry. IEE Colloquium Digest No. 1994/100: Image Processing for Biometric Measurement, pp GEORGE, M.: A new strategy for low power, high discrimination voice biometrics. Smart Card 1995, pp Association for Biometrics (Contact: P. Hawkes, BTG plc, 101 Newington Causeway, London, SE1 6BU): Workshop on State of the art in signature verification, NPL, Teddington, November 1993 KAPPA signature verification public trials and public survey on biometrics, BTG plc, 101 Newington Causeway, London, SE1 6BU, May 1994 LEE, S., and PAN, J. C.: Offline tracing and representation of signatures, IEEE Trans., 1992, SMC-22, pp SABOURIN, R., and PLAMONDON, R.: Observability and similarity in spatial relations in the structural interpretation of handwritten signature images. Proc. 7th Scandinavian Conf. on Image Analysis, Arlborg, 1991, pp PLAMONDON, R., and PARIZEAU, M.: Signature veriiication from position, velocity and acceleration signals. Proc. 9th Int. Conf. on Pattern Recognition, Rome, PLAMONDON, R.: A model-based dynamic signature verification system. Conf. on Fundamentals in Handwriting Recognition, Chateau de Bonas, France, 1993, pp BRAULT, J. j.: Segmenting handwritten signatures at their perceptually important points, IEEE Trans., 1994, PAMI- 15, pp PLAMONDON, R., YERGEAU, P., and BRAULT, J. J.: A multilevel signature verification system, in IMPEDOVO, S., and SIMON, J. C. (Eds.): From pixels to features 111 (Elsevier, 1992), pp IMPEDOVO, S., CASTELLANO, M., and PIRLO, G.: On-line signature verification through stroke analysis. Proc. AFTEC Conf. on New Concepts in Computer Science, 1990, pp FAIRHURST, M. C.: Automatic signature verification: making it work. Proc. 1st IEE European Workshop on Handwriting Analysis and Recognition, Brussels, LALONDE, M.: A neural network approach to handwritten curve partitioning. Proc. Vision Interfaces 93, 1993, pp. 13E DROUHARD, J. P.: Off-line signature verification using directional PDF and neural networks. Proc. 11th ICPR, 1992, pp BROMLEY, J., and BENTZ, J. W.: Signature verification using a Siamese time delay neural network, Int. J. Pattern Recognit. Art$ Intell., 1993,7, p PLAMONDON, R., and LORETTE, G.: Automatic signature verification and writer identification - the state of the art, Pattern Recognit., 1989,22, pp LECLERC, F., and PLAMONDON, R.: Automatic signature verification - the state of the art : Int. J. Pattern Recognit. Art$ Intell., 1994,8, pp BRITTAN, P, and FAIRHURST, M C: An approach to handwritten signature verification using a high performance parallel architecture, in IMPEDOVO, S., and SIMON, j. C. (Eds.): From pixels to features 111 (Elsevier, 1992), pp: FAIRHURST, M. C., BRI TTAN, P., and COWLEY, K. D.: Parallel realisation of feature selgction for a high performance signature verification system. Proc. PACTA, Barcelona, 1992, pp IEE: 1997 First received 14th February and in revised form 25th July ELECTRONICS & COMMUNICATION ENGINEERING JOURNAL DECEMBER 1997

The Use of Static Biometric Signature Data from Public Service Forms

The Use of Static Biometric Signature Data from Public Service Forms The Use of Static Biometric Signature Data from Public Service Forms Emma Johnson and Richard Guest School of Engineering and Digital Arts, University of Kent, Canterbury, UK {ej45,r.m.guest}@kent.ac.uk

More information

User Awareness of Biometrics

User Awareness of Biometrics Advances in Networks, Computing and Communications 4 User Awareness of Biometrics B.J.Edmonds and S.M.Furnell Network Research Group, University of Plymouth, Plymouth, United Kingdom e-mail: info@network-research-group.org

More information

Biometrics 2/23/17. the last category for authentication methods is. this is the realm of biometrics

Biometrics 2/23/17. the last category for authentication methods is. this is the realm of biometrics CSC362, Information Security the last category for authentication methods is Something I am or do, which means some physical or behavioral characteristic that uniquely identifies the user and can be used

More information

Introduction to Biometrics 1

Introduction to Biometrics 1 Introduction to Biometrics 1 Gerik Alexander v.graevenitz von Graevenitz Biometrics, Bonn, Germany May, 14th 2004 Introduction to Biometrics Biometrics refers to the automatic identification of a living

More information

Offline Signature Verification for Cheque Authentication Using Different Technique

Offline Signature Verification for Cheque Authentication Using Different Technique Offline Signature Verification for Cheque Authentication Using Different Technique Dr. Balaji Gundappa Hogade 1, Yogita Praful Gawde 2 1 Research Scholar, NMIMS, MPSTME, Associate Professor, TEC, Navi

More information

Authenticated Document Management System

Authenticated Document Management System Authenticated Document Management System P. Anup Krishna Research Scholar at Bharathiar University, Coimbatore, Tamilnadu Dr. Sudheer Marar Head of Department, Faculty of Computer Applications, Nehru College

More information

BIOMETRICS BY- VARTIKA PAUL 4IT55

BIOMETRICS BY- VARTIKA PAUL 4IT55 BIOMETRICS BY- VARTIKA PAUL 4IT55 BIOMETRICS Definition Biometrics is the identification or verification of human identity through the measurement of repeatable physiological and behavioral characteristics

More information

Biometrics - A Tool in Fraud Prevention

Biometrics - A Tool in Fraud Prevention Biometrics - A Tool in Fraud Prevention Agenda Authentication Biometrics : Need, Available Technologies, Working, Comparison Fingerprint Technology About Enrollment, Matching and Verification Key Concepts

More information

IMPACT OF SIGNATURE LEGIBILITY AND SIGNATURE TYPE IN OFF-LINE SIGNATURE VERIFICATION.

IMPACT OF SIGNATURE LEGIBILITY AND SIGNATURE TYPE IN OFF-LINE SIGNATURE VERIFICATION. IMPACT OF SIGNATURE LEGIBILITY AND SIGNATURE TYPE IN OFF-LINE SIGNATURE VERIFICATION F. Alonso-Fernandez a, M.C. Fairhurst b, J. Fierrez a and J. Ortega-Garcia a. a Biometric Recognition Group - ATVS,

More information

Notes from a seminar on "Tackling Public Sector Fraud" presented jointly by the UK NAO and H M Treasury in London, England in February 1998.

Notes from a seminar on Tackling Public Sector Fraud presented jointly by the UK NAO and H M Treasury in London, England in February 1998. Tackling Public Sector Fraud Notes from a seminar on "Tackling Public Sector Fraud" presented jointly by the UK NAO and H M Treasury in London, England in February 1998. Glenis Bevan audit Manager, Audit

More information

Proposed Method for Off-line Signature Recognition and Verification using Neural Network

Proposed Method for Off-line Signature Recognition and Verification using Neural Network e-issn: 2349-9745 p-issn: 2393-8161 Scientific Journal Impact Factor (SJIF): 1.711 International Journal of Modern Trends in Engineering and Research www.ijmter.com Proposed Method for Off-line Signature

More information

Real time verification of Offline handwritten signatures using K-means clustering

Real time verification of Offline handwritten signatures using K-means clustering Real time verification of Offline handwritten signatures using K-means clustering Alpana Deka 1, Lipi B. Mahanta 2* 1 Department of Computer Science, NERIM Group of Institutions, Guwahati, Assam, India

More information

SVC2004: First International Signature Verification Competition

SVC2004: First International Signature Verification Competition SVC2004: First International Signature Verification Competition Dit-Yan Yeung 1, Hong Chang 1, Yimin Xiong 1, Susan George 2, Ramanujan Kashi 3, Takashi Matsumoto 4, and Gerhard Rigoll 5 1 Hong Kong University

More information

Iris Recognition using Histogram Analysis

Iris Recognition using Histogram Analysis Iris Recognition using Histogram Analysis Robert W. Ives, Anthony J. Guidry and Delores M. Etter Electrical Engineering Department, U.S. Naval Academy Annapolis, MD 21402-5025 Abstract- Iris recognition

More information

Biometric Authentication for secure e-transactions: Research Opportunities and Trends

Biometric Authentication for secure e-transactions: Research Opportunities and Trends Biometric Authentication for secure e-transactions: Research Opportunities and Trends Fahad M. Al-Harby College of Computer and Information Security Naif Arab University for Security Sciences (NAUSS) fahad.alharby@nauss.edu.sa

More information

Nikhil Gupta *1, Dr Rakesh Dhiman 2 ABSTRACT I. INTRODUCTION

Nikhil Gupta *1, Dr Rakesh Dhiman 2 ABSTRACT I. INTRODUCTION International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 6 ISSN : 2456-3307 An Offline Handwritten Signature Verification Using

More information

CHAPTER 8 RESEARCH METHODOLOGY AND DESIGN

CHAPTER 8 RESEARCH METHODOLOGY AND DESIGN CHAPTER 8 RESEARCH METHODOLOGY AND DESIGN 8.1 Introduction This chapter gives a brief overview of the field of research methodology. It contains a review of a variety of research perspectives and approaches

More information

ISO/IEC TR TECHNICAL REPORT. Information technology Biometrics tutorial. Technologies de l'information Tutoriel biométrique

ISO/IEC TR TECHNICAL REPORT. Information technology Biometrics tutorial. Technologies de l'information Tutoriel biométrique TECHNICAL REPORT ISO/IEC TR 24741 First edition 2007-09-15 Information technology Biometrics tutorial Technologies de l'information Tutoriel biométrique Reference number ISO/IEC 2007 Contents Page Foreword...

More information

INTERNATIONAL RESEARCH JOURNAL IN ADVANCED ENGINEERING AND TECHNOLOGY (IRJAET)

INTERNATIONAL RESEARCH JOURNAL IN ADVANCED ENGINEERING AND TECHNOLOGY (IRJAET) INTERNATIONAL RESEARCH JOURNAL IN ADVANCED ENGINEERING AND TECHNOLOGY (IRJAET) www.irjaet.com ISSN (PRINT) : 2454-4744 ISSN (ONLINE): 2454-4752 Vol. 1, Issue 4, pp.240-245, November, 2015 IRIS RECOGNITION

More information

Classification of Features into Strong and Weak Features for an Intelligent Online Signature Verification System

Classification of Features into Strong and Weak Features for an Intelligent Online Signature Verification System Classification of Features into Strong and Weak Features for an Intelligent Online Signature Verification System Saad Tariq, Saqib Sarwar & Waqar Hussain Department of Electrical Engineering Air University

More information

Effective and Efficient Fingerprint Image Postprocessing

Effective and Efficient Fingerprint Image Postprocessing Effective and Efficient Fingerprint Image Postprocessing Haiping Lu, Xudong Jiang and Wei-Yun Yau Laboratories for Information Technology 21 Heng Mui Keng Terrace, Singapore 119613 Email: hplu@lit.org.sg

More information

Author(s) Corr, Philip J.; Silvestre, Guenole C.; Bleakley, Christopher J. The Irish Pattern Recognition & Classification Society

Author(s) Corr, Philip J.; Silvestre, Guenole C.; Bleakley, Christopher J. The Irish Pattern Recognition & Classification Society Provided by the author(s) and University College Dublin Library in accordance with publisher policies. Please cite the published version when available. Title Open Source Dataset and Deep Learning Models

More information

An Algorithm for Fingerprint Image Postprocessing

An Algorithm for Fingerprint Image Postprocessing An Algorithm for Fingerprint Image Postprocessing Marius Tico, Pauli Kuosmanen Tampere University of Technology Digital Media Institute EO.BOX 553, FIN-33101, Tampere, FINLAND tico@cs.tut.fi Abstract Most

More information

EFFICIENT ATTENDANCE MANAGEMENT SYSTEM USING FACE DETECTION AND RECOGNITION

EFFICIENT ATTENDANCE MANAGEMENT SYSTEM USING FACE DETECTION AND RECOGNITION EFFICIENT ATTENDANCE MANAGEMENT SYSTEM USING FACE DETECTION AND RECOGNITION 1 Arun.A.V, 2 Bhatath.S, 3 Chethan.N, 4 Manmohan.C.M, 5 Hamsaveni M 1,2,3,4,5 Department of Computer Science and Engineering,

More information

ISSN Vol.02,Issue.17, November-2013, Pages:

ISSN Vol.02,Issue.17, November-2013, Pages: www.semargroups.org, www.ijsetr.com ISSN 2319-8885 Vol.02,Issue.17, November-2013, Pages:1973-1977 A Novel Multimodal Biometric Approach of Face and Ear Recognition using DWT & FFT Algorithms K. L. N.

More information

An Overview of Biometrics. Dr. Charles C. Tappert Seidenberg School of CSIS, Pace University

An Overview of Biometrics. Dr. Charles C. Tappert Seidenberg School of CSIS, Pace University An Overview of Biometrics Dr. Charles C. Tappert Seidenberg School of CSIS, Pace University What are Biometrics? Biometrics refers to identification of humans by their characteristics or traits Physical

More information

Static Signature Verification and Recognition using Neural Network Approach-A Survey

Static Signature Verification and Recognition using Neural Network Approach-A Survey Available online www.ejaet.com European Journal of Advances in Engineering and Technology, 2015, 2(4): 46-50 Review Article ISSN: 2394-658X Static Signature Verification and Recognition using Neural Network

More information

License Plate Localisation based on Morphological Operations

License Plate Localisation based on Morphological Operations License Plate Localisation based on Morphological Operations Xiaojun Zhai, Faycal Benssali and Soodamani Ramalingam School of Engineering & Technology University of Hertfordshire, UH Hatfield, UK Abstract

More information

Academic Vocabulary Test 1:

Academic Vocabulary Test 1: Academic Vocabulary Test 1: How Well Do You Know the 1st Half of the AWL? Take this academic vocabulary test to see how well you have learned the vocabulary from the Academic Word List that has been practiced

More information

Biometric Recognition: How Do I Know Who You Are?

Biometric Recognition: How Do I Know Who You Are? Biometric Recognition: How Do I Know Who You Are? Anil K. Jain Department of Computer Science and Engineering, 3115 Engineering Building, Michigan State University, East Lansing, MI 48824, USA jain@cse.msu.edu

More information

Iris Recognition-based Security System with Canny Filter

Iris Recognition-based Security System with Canny Filter Canny Filter Dr. Computer Engineering Department, University of Technology, Baghdad-Iraq E-mail: hjhh2007@yahoo.com Received: 8/9/2014 Accepted: 21/1/2015 Abstract Image identification plays a great role

More information

Automated Signature Detection from Hand Movement ¹

Automated Signature Detection from Hand Movement ¹ Automated Signature Detection from Hand Movement ¹ Mladen Savov, Georgi Gluhchev Abstract: The problem of analyzing hand movements of an individual placing a signature has been studied in order to identify

More information

Technology Transfer: An Integrated Culture-Friendly Approach

Technology Transfer: An Integrated Culture-Friendly Approach Technology Transfer: An Integrated Culture-Friendly Approach I.J. Bate, A. Burns, T.O. Jackson, T.P. Kelly, W. Lam, P. Tongue, J.A. McDermid, A.L. Powell, J.E. Smith, A.J. Vickers, A.J. Wellings, B.R.

More information

Impediments to designing and developing for accessibility, accommodation and high quality interaction

Impediments to designing and developing for accessibility, accommodation and high quality interaction Impediments to designing and developing for accessibility, accommodation and high quality interaction D. Akoumianakis and C. Stephanidis Institute of Computer Science Foundation for Research and Technology-Hellas

More information

Stamp detection in scanned documents

Stamp detection in scanned documents Annales UMCS Informatica AI X, 1 (2010) 61-68 DOI: 10.2478/v10065-010-0036-6 Stamp detection in scanned documents Paweł Forczmański Chair of Multimedia Systems, West Pomeranian University of Technology,

More information

Image Extraction using Image Mining Technique

Image Extraction using Image Mining Technique IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 9 (September. 2013), V2 PP 36-42 Image Extraction using Image Mining Technique Prof. Samir Kumar Bandyopadhyay,

More information

Experiments with An Improved Iris Segmentation Algorithm

Experiments with An Improved Iris Segmentation Algorithm Experiments with An Improved Iris Segmentation Algorithm Xiaomei Liu, Kevin W. Bowyer, Patrick J. Flynn Department of Computer Science and Engineering University of Notre Dame Notre Dame, IN 46556, U.S.A.

More information

Evaluation of Online Signature Verification Features

Evaluation of Online Signature Verification Features Evaluation of Online Signature Verification Features Ghazaleh Taherzadeh*, Roozbeh Karimi*, Alireza Ghobadi*, Hossein Modaberan Beh** * Faculty of Information Technology Multimedia University, Selangor,

More information

Counterfeit, Falsified and Substandard Medicines

Counterfeit, Falsified and Substandard Medicines Meeting Summary Counterfeit, Falsified and Substandard Medicines Charles Clift Senior Research Consultant, Centre on Global Health Security December 2010 The views expressed in this document are the sole

More information

A Data-Embedding Pen

A Data-Embedding Pen A Data-Embedding Pen Seiichi Uchida Λ, Kazuhiro Tanaka Λ, Masakazu Iwamura ΛΛ, Shinichiro Omachi ΛΛΛ, Koichi Kise ΛΛ Λ Kyushu University, Fukuoka, Japan. ΛΛ Osaka Prefecture University, Osaka, Japan. ΛΛΛ

More information

IRIS Biometric for Person Identification. By Lakshmi Supriya.D M.Tech 04IT6002 Dept. of Information Technology

IRIS Biometric for Person Identification. By Lakshmi Supriya.D M.Tech 04IT6002 Dept. of Information Technology IRIS Biometric for Person Identification By Lakshmi Supriya.D M.Tech 04IT6002 Dept. of Information Technology What are Biometrics? Why are Biometrics used? How Biometrics is today? Iris Iris is the area

More information

OUTLINES: ABSTRACT INTRODUCTION PALM VEIN AUTHENTICATION IMPLEMENTATION OF CONTACTLESS PALM VEIN AUTHENTICATIONSAPPLICATIONS

OUTLINES: ABSTRACT INTRODUCTION PALM VEIN AUTHENTICATION IMPLEMENTATION OF CONTACTLESS PALM VEIN AUTHENTICATIONSAPPLICATIONS 1 OUTLINES: ABSTRACT INTRODUCTION PALM VEIN AUTHENTICATION IMPLEMENTATION OF CONTACTLESS PALM VEIN AUTHENTICATIONSAPPLICATIONS RESULTS OF PRACTICAL EXPERIMENTS CONCLUSION 2 ABSTRACT IDENTITY VERIFICATION

More information

Impulse noise features for automatic selection of noise cleaning filter

Impulse noise features for automatic selection of noise cleaning filter Impulse noise features for automatic selection of noise cleaning filter Odej Kao Department of Computer Science Technical University of Clausthal Julius-Albert-Strasse 37 Clausthal-Zellerfeld, Germany

More information

Online handwritten signature verification system: A Review

Online handwritten signature verification system: A Review Online handwritten signature verification system: A Review Abstract: Online handwritten signature verification system is one of the most reliable, fast and cost effective tool for user authentication.

More information

A new seal verification for Chinese color seal

A new seal verification for Chinese color seal Edith Cowan University Research Online ECU Publications 2011 2011 A new seal verification for Chinese color seal Zhihu Huang Jinsong Leng Edith Cowan University 10.4028/www.scientific.net/AMM.58-60.2558

More information

Content Based Image Retrieval Using Color Histogram

Content Based Image Retrieval Using Color Histogram Content Based Image Retrieval Using Color Histogram Nitin Jain Assistant Professor, Lokmanya Tilak College of Engineering, Navi Mumbai, India. Dr. S. S. Salankar Professor, G.H. Raisoni College of Engineering,

More information

Online Signature Verification by Using FPGA

Online Signature Verification by Using FPGA Online Signature Verification by Using FPGA D.Sandeep Assistant Professor, Department of ECE, Vignan Institute of Technology & Science, Telangana, India. ABSTRACT: The main aim of this project is used

More information

Assessing the Welfare of Farm Animals

Assessing the Welfare of Farm Animals Assessing the Welfare of Farm Animals Part 1. Part 2. Review Development and Implementation of a Unified field Index (UFI) February 2013 Drewe Ferguson 1, Ian Colditz 1, Teresa Collins 2, Lindsay Matthews

More information

University of Bristol - Explore Bristol Research. Peer reviewed version Link to published version (if available): /ISCAS.1999.

University of Bristol - Explore Bristol Research. Peer reviewed version Link to published version (if available): /ISCAS.1999. Fernando, W. A. C., Canagarajah, C. N., & Bull, D. R. (1999). Automatic detection of fade-in and fade-out in video sequences. In Proceddings of ISACAS, Image and Video Processing, Multimedia and Communications,

More information

Systems Engineering Overview. Axel Claudio Alex Gonzalez

Systems Engineering Overview. Axel Claudio Alex Gonzalez Systems Engineering Overview Axel Claudio Alex Gonzalez Objectives Provide additional insights into Systems and into Systems Engineering Walkthrough the different phases of the product lifecycle Discuss

More information

Processing and Enhancement of Palm Vein Image in Vein Pattern Recognition System

Processing and Enhancement of Palm Vein Image in Vein Pattern Recognition System Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 4, April 2015,

More information

Drum Transcription Based on Independent Subspace Analysis

Drum Transcription Based on Independent Subspace Analysis Report for EE 391 Special Studies and Reports for Electrical Engineering Drum Transcription Based on Independent Subspace Analysis Yinyi Guo Center for Computer Research in Music and Acoustics, Stanford,

More information

A Proposal for Security Oversight at Automated Teller Machine System

A Proposal for Security Oversight at Automated Teller Machine System International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 10, Issue 6 (June 2014), PP.18-25 A Proposal for Security Oversight at Automated

More information

STUDY ON FIREWALL APPROACH FOR THE REGRESSION TESTING OF OBJECT-ORIENTED SOFTWARE

STUDY ON FIREWALL APPROACH FOR THE REGRESSION TESTING OF OBJECT-ORIENTED SOFTWARE STUDY ON FIREWALL APPROACH FOR THE REGRESSION TESTING OF OBJECT-ORIENTED SOFTWARE TAWDE SANTOSH SAHEBRAO DEPT. OF COMPUTER SCIENCE CMJ UNIVERSITY, SHILLONG, MEGHALAYA ABSTRACT Adherence to a defined process

More information

Secured Bank Authentication using Image Processing and Visual Cryptography

Secured Bank Authentication using Image Processing and Visual Cryptography Secured Bank Authentication using Image Processing and Visual Cryptography B.Srikanth 1, G.Padmaja 2, Dr. Syed Khasim 3, Dr. P.V.S.Lakshmi 4, A.Haritha 5 1 Assistant Professor, Department of CSE, PSCMRCET,

More information

Abstract. Most OCR systems decompose the process into several stages:

Abstract. Most OCR systems decompose the process into several stages: Artificial Neural Network Based On Optical Character Recognition Sameeksha Barve Computer Science Department Jawaharlal Institute of Technology, Khargone (M.P) Abstract The recognition of optical characters

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 4, April 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Novel Approach

More information

Towards a Software Engineering Research Framework: Extending Design Science Research

Towards a Software Engineering Research Framework: Extending Design Science Research Towards a Software Engineering Research Framework: Extending Design Science Research Murat Pasa Uysal 1 1Department of Management Information Systems, Ufuk University, Ankara, Turkey ---------------------------------------------------------------------***---------------------------------------------------------------------

More information

Proceedings of the 2014 Federated Conference on Computer Science and Information Systems pp

Proceedings of the 2014 Federated Conference on Computer Science and Information Systems pp Proceedings of the 204 Federated Conference on Computer Science and Information Systems pp. 70 708 DOI: 0.5439/204F59 ACSIS, Vol. 2 Handwritten Signature Verification with 2D Color Barcodes Marco Querini,

More information

Socio-cognitive Engineering

Socio-cognitive Engineering Socio-cognitive Engineering Mike Sharples Educational Technology Research Group University of Birmingham m.sharples@bham.ac.uk ABSTRACT Socio-cognitive engineering is a framework for the human-centred

More information

Student Attendance Monitoring System Via Face Detection and Recognition System

Student Attendance Monitoring System Via Face Detection and Recognition System IJSTE - International Journal of Science Technology & Engineering Volume 2 Issue 11 May 2016 ISSN (online): 2349-784X Student Attendance Monitoring System Via Face Detection and Recognition System Pinal

More information

System of Systems Software Assurance

System of Systems Software Assurance System of Systems Software Assurance Introduction Under DoD sponsorship, the Software Engineering Institute has initiated a research project on system of systems (SoS) software assurance. The project s

More information

Second Symposium & Workshop on ICAO-Standard MRTDs, Biometrics and Security

Second Symposium & Workshop on ICAO-Standard MRTDs, Biometrics and Security Second Symposium & Workshop on ICAO-Standard MRTDs, Biometrics and Security Face Biometric Capture & Applications Terry Hartmann Director and Global Solution Lead Secure Identification & Biometrics UNISYS

More information

CANADA Revisions to Manual of Patent Office Practice (MPOP)

CANADA Revisions to Manual of Patent Office Practice (MPOP) CANADA Revisions to Manual of Patent Office Practice (MPOP) H. Sam Frost June 18, 2005 General Patentability Requirements Novelty Utility Non-Obviousness Patentable Subject Matter Software and Business

More information

INCREASING NETWORK CAPACITY BY OPTIMISING VOLTAGE REGULATION ON MEDIUM AND LOW VOLTAGE FEEDERS

INCREASING NETWORK CAPACITY BY OPTIMISING VOLTAGE REGULATION ON MEDIUM AND LOW VOLTAGE FEEDERS INCREASING NETWORK CAPACITY BY OPTIMISING VOLTAGE REGULATION ON MEDIUM AND LOW VOLTAGE FEEDERS Carter-Brown Clinton Eskom Distribution - South Africa cartercg@eskom.co.za Gaunt CT University of Cape Town

More information

Iris Segmentation & Recognition in Unconstrained Environment

Iris Segmentation & Recognition in Unconstrained Environment www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume - 3 Issue -8 August, 2014 Page No. 7514-7518 Iris Segmentation & Recognition in Unconstrained Environment ABSTRACT

More information

International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN IJSER

International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN IJSER International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December-2016 192 A Novel Approach For Face Liveness Detection To Avoid Face Spoofing Attacks Meenakshi Research Scholar,

More information

Getting the evidence: Using research in policy making

Getting the evidence: Using research in policy making Getting the evidence: Using research in policy making REPORT BY THE COMPTROLLER AND AUDITOR GENERAL HC 586-I Session 2002-2003: 16 April 2003 LONDON: The Stationery Office 14.00 Two volumes not to be sold

More information

in the New Zealand Curriculum

in the New Zealand Curriculum Technology in the New Zealand Curriculum We ve revised the Technology learning area to strengthen the positioning of digital technologies in the New Zealand Curriculum. The goal of this change is to ensure

More information

HISTOGRAM EQUALISATION AS A METHOD FOR MAKING AN OBJECTIVE COMPARISON BETWEEN ANTENNA PATTERNS FUNCTIONS

HISTOGRAM EQUALISATION AS A METHOD FOR MAKING AN OBJECTIVE COMPARISON BETWEEN ANTENNA PATTERNS FUNCTIONS HISTOGRAM EQUALISATION AS A METHOD FOR MAKING AN OBJECTIVE COMPARISON BETWEEN ANTENNA PATTERNS FUNCTIONS S.F. Gregson (1), J. McCormick (2), C.G. Parini (3) (1) Nearfield Systems, Inc. 1973 Magellan Drive,

More information

RELIABILITY OF GUIDED WAVE ULTRASONIC TESTING. Dr. Mark EVANS and Dr. Thomas VOGT Guided Ultrasonics Ltd. Nottingham, UK

RELIABILITY OF GUIDED WAVE ULTRASONIC TESTING. Dr. Mark EVANS and Dr. Thomas VOGT Guided Ultrasonics Ltd. Nottingham, UK RELIABILITY OF GUIDED WAVE ULTRASONIC TESTING Dr. Mark EVANS and Dr. Thomas VOGT Guided Ultrasonics Ltd. Nottingham, UK The Guided wave testing method (GW) is increasingly being used worldwide to test

More information

37 Game Theory. Bebe b1 b2 b3. a Abe a a A Two-Person Zero-Sum Game

37 Game Theory. Bebe b1 b2 b3. a Abe a a A Two-Person Zero-Sum Game 37 Game Theory Game theory is one of the most interesting topics of discrete mathematics. The principal theorem of game theory is sublime and wonderful. We will merely assume this theorem and use it to

More information

Colour Profiling Using Multiple Colour Spaces

Colour Profiling Using Multiple Colour Spaces Colour Profiling Using Multiple Colour Spaces Nicola Duffy and Gerard Lacey Computer Vision and Robotics Group, Trinity College, Dublin.Ireland duffynn@cs.tcd.ie Abstract This paper presents an original

More information

An Efficient Approach for Iris Recognition by Improving Iris Segmentation and Iris Image Compression

An Efficient Approach for Iris Recognition by Improving Iris Segmentation and Iris Image Compression An Efficient Approach for Iris Recognition by Improving Iris Segmentation and Iris Image Compression K. N. Jariwala, SVNIT, Surat, India U. D. Dalal, SVNIT, Surat, India Abstract The biometric person authentication

More information

Feature Extraction Technique Based On Circular Strip for Palmprint Recognition

Feature Extraction Technique Based On Circular Strip for Palmprint Recognition Feature Extraction Technique Based On Circular Strip for Palmprint Recognition Dr.S.Valarmathy 1, R.Karthiprakash 2, C.Poonkuzhali 3 1, 2, 3 ECE Department, Bannari Amman Institute of Technology, Sathyamangalam

More information

EUROPEAN GUIDANCE MATERIAL ON CONTINUITY OF SERVICE EVALUATION IN SUPPORT OF THE CERTIFICATION OF ILS & MLS GROUND SYSTEMS

EUROPEAN GUIDANCE MATERIAL ON CONTINUITY OF SERVICE EVALUATION IN SUPPORT OF THE CERTIFICATION OF ILS & MLS GROUND SYSTEMS EUR DOC 012 EUROPEAN GUIDANCE MATERIAL ON CONTINUITY OF SERVICE EVALUATION IN SUPPORT OF THE CERTIFICATION OF ILS & MLS GROUND SYSTEMS First Edition Approved by the European Air Navigation Planning Group

More information

A Novel Fuzzy Neural Network Based Distance Relaying Scheme

A Novel Fuzzy Neural Network Based Distance Relaying Scheme 902 IEEE TRANSACTIONS ON POWER DELIVERY, VOL. 15, NO. 3, JULY 2000 A Novel Fuzzy Neural Network Based Distance Relaying Scheme P. K. Dash, A. K. Pradhan, and G. Panda Abstract This paper presents a new

More information

PERFORMANCE OF A NEW MEMS MEASUREMENT MICROPHONE AND ITS POTENTIAL APPLICATION

PERFORMANCE OF A NEW MEMS MEASUREMENT MICROPHONE AND ITS POTENTIAL APPLICATION PERFORMANCE OF A NEW MEMS MEASUREMENT MICROPHONE AND ITS POTENTIAL APPLICATION R Barham M Goldsmith National Physical Laboratory, Teddington, Middlesex, UK Teddington, Middlesex, UK 1 INTRODUCTION In deciding

More information

Dimension Recognition and Geometry Reconstruction in Vectorization of Engineering Drawings

Dimension Recognition and Geometry Reconstruction in Vectorization of Engineering Drawings Dimension Recognition and Geometry Reconstruction in Vectorization of Engineering Drawings Feng Su 1, Jiqiang Song 1, Chiew-Lan Tai 2, and Shijie Cai 1 1 State Key Laboratory for Novel Software Technology,

More information

Vein and Fingerprint Identification Multi Biometric System: A Novel Approach

Vein and Fingerprint Identification Multi Biometric System: A Novel Approach Vein and Fingerprint Identification Multi Biometric System: A Novel Approach Hatim A. Aboalsamh Abstract In this paper, a compact system that consists of a Biometrics technology CMOS fingerprint sensor

More information

E90 Project Proposal. 6 December 2006 Paul Azunre Thomas Murray David Wright

E90 Project Proposal. 6 December 2006 Paul Azunre Thomas Murray David Wright E90 Project Proposal 6 December 2006 Paul Azunre Thomas Murray David Wright Table of Contents Abstract 3 Introduction..4 Technical Discussion...4 Tracking Input..4 Haptic Feedack.6 Project Implementation....7

More information

User Authentication. Goals for Today. My goals with the blog. What You Have. Tadayoshi Kohno

User Authentication. Goals for Today. My goals with the blog. What You Have. Tadayoshi Kohno CSE 484 (Winter 2008) User Authentication Tadayoshi Kohno Thanks to Dan Boneh, Dieter Gollmann, John Manferdelli, John Mitchell, Vitaly Shmatikov, Bennet Yee, and many others for sample slides and materials...

More information

Shape Representation Robust to the Sketching Order Using Distance Map and Direction Histogram

Shape Representation Robust to the Sketching Order Using Distance Map and Direction Histogram Shape Representation Robust to the Sketching Order Using Distance Map and Direction Histogram Kiwon Yun, Junyeong Yang, and Hyeran Byun Dept. of Computer Science, Yonsei University, Seoul, Korea, 120-749

More information

Feature Accuracy assessment of the modern industrial robot

Feature Accuracy assessment of the modern industrial robot Feature Accuracy assessment of the modern industrial robot Ken Young and Craig G. Pickin The authors Ken Young is Principal Research Fellow and Craig G. Pickin is a Research Fellow, both at Warwick University,

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions What is Ethically Aligned Design? Ethically Aligned Design: A Vision for Prioritizing Human Well-being with Autonomous and Intelligent Systems (A/IS) is a work that encourages

More information

Introduction to Video Forgery Detection: Part I

Introduction to Video Forgery Detection: Part I Introduction to Video Forgery Detection: Part I Detecting Forgery From Static-Scene Video Based on Inconsistency in Noise Level Functions IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 5,

More information

Face Recognition Based Attendance System with Student Monitoring Using RFID Technology

Face Recognition Based Attendance System with Student Monitoring Using RFID Technology Face Recognition Based Attendance System with Student Monitoring Using RFID Technology Abhishek N1, Mamatha B R2, Ranjitha M3, Shilpa Bai B4 1,2,3,4 Dept of ECE, SJBIT, Bangalore, Karnataka, India Abstract:

More information

IAB Europe Guidance THE DEFINITION OF PERSONAL DATA. IAB Europe GDPR Implementation Working Group WHITE PAPER

IAB Europe Guidance THE DEFINITION OF PERSONAL DATA. IAB Europe GDPR Implementation Working Group WHITE PAPER IAB Europe Guidance WHITE PAPER THE DEFINITION OF PERSONAL DATA Five Practical Steps to help companies comply with the E-Privacy Working Directive Paper 02/2017 IAB Europe GDPR Implementation Working Group

More information

Combined Approach for Face Detection, Eye Region Detection and Eye State Analysis- Extended Paper

Combined Approach for Face Detection, Eye Region Detection and Eye State Analysis- Extended Paper International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 10, Issue 9 (September 2014), PP.57-68 Combined Approach for Face Detection, Eye

More information

Pixel Based Off-line Signature Verification System

Pixel Based Off-line Signature Verification System Research Paper American Journal of Engineering Research (AJER) e-issn : 2320-0847 p-issn : 2320-0936 Volume-04, Issue-01, pp-187-192 www.ajer.org Open Access Pixel Based Off-line Signature Verification

More information

A MODIFIED ALGORITHM FOR ATTENDANCE MANAGEMENT SYSTEM USING FACE RECOGNITION

A MODIFIED ALGORITHM FOR ATTENDANCE MANAGEMENT SYSTEM USING FACE RECOGNITION A MODIFIED ALGORITHM FOR ATTENDANCE MANAGEMENT SYSTEM USING FACE RECOGNITION Akila K 1, S.Ramanathan 2, B.Sathyaseelan 3, S.Srinath 4, R.R.V.Sivaraju 5 International Journal of Latest Trends in Engineering

More information

Applying the Feature Selective Validation (FSV) method to quantifying rf measurement comparisons

Applying the Feature Selective Validation (FSV) method to quantifying rf measurement comparisons Applying the Feature Selective Validation (FSV) method to quantifying rf measurement comparisons H.G. Sasse hgs@dmu.ac.uk A.P. Duffy apd@dmu.ac.uk Department of Engineering De Montfort University LE 9BH

More information

IS 525 Chapter 2. Methodology Dr. Nesrine Zemirli

IS 525 Chapter 2. Methodology Dr. Nesrine Zemirli IS 525 Chapter 2 Methodology Dr. Nesrine Zemirli Assistant Professor. IS Department CCIS / King Saud University E-mail: Web: http://fac.ksu.edu.sa/nzemirli/home Chapter Topics Fundamental concepts and

More information

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org) 1

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org) 1 IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 2, Issue 2, Apr- Generating an Iris Code Using Iris Recognition for Biometric Application S.Banurekha 1, V.Manisha

More information

ROBOT VISION. Dr.M.Madhavi, MED, MVSREC

ROBOT VISION. Dr.M.Madhavi, MED, MVSREC ROBOT VISION Dr.M.Madhavi, MED, MVSREC Robotic vision may be defined as the process of acquiring and extracting information from images of 3-D world. Robotic vision is primarily targeted at manipulation

More information

Biometric Signature for Mobile Devices

Biometric Signature for Mobile Devices Chapter 13 Biometric Signature for Mobile Devices Maria Villa and Abhishek Verma CONTENTS 13.1 Biometric Signature Recognition 309 13.2 Introduction 310 13.2.1 How Biometric Signature Works 310 13.2.2

More information

Pan-Canadian Trust Framework Overview

Pan-Canadian Trust Framework Overview Pan-Canadian Trust Framework Overview A collaborative approach to developing a Pan- Canadian Trust Framework Authors: DIACC Trust Framework Expert Committee August 2016 Abstract: The purpose of this document

More information

A Cryptosystem With Private Key Generation From Dynamic Properties of Human Hand Signature

A Cryptosystem With Private Key Generation From Dynamic Properties of Human Hand Signature A Cryptosystem With Private Key Generation From Dynamic Properties of Human Hand Signature HAO FENG School of Electrical & Electronic Engineering A thesis submitted to the Nanyang Technological University

More information

Towards an MDA-based development methodology 1

Towards an MDA-based development methodology 1 Towards an MDA-based development methodology 1 Anastasius Gavras 1, Mariano Belaunde 2, Luís Ferreira Pires 3, João Paulo A. Almeida 3 1 Eurescom GmbH, 2 France Télécom R&D, 3 University of Twente 1 gavras@eurescom.de,

More information

Multiple Antenna Systems in WiMAX

Multiple Antenna Systems in WiMAX WHITEPAPER An Introduction to MIMO, SAS and Diversity supported by Airspan s WiMAX Product Line We Make WiMAX Easy Multiple Antenna Systems in WiMAX An Introduction to MIMO, SAS and Diversity supported

More information